Hacker Newsnew | past | comments | ask | show | jobs | submit | tylerd22's commentslogin

I don't have physical pain thankfully, but I have severe tinnitus.

I'm unable to work for more than a few hours. I'm having a hard time to fall asleep.

The fear of it getting worse is generating a large amount of stress.


Mine doesn't bother me during the day, but it does at night. Depending on how tired I am, it may take me anywhere from 20 minutes to 3 hours to fall asleep.


A fan helps me to sleep with tinnitus.


I remember discovering Moxie Marlinspike talking about this issue 9 years ago and he described this attack as "deadly".

And it really is. In essence, a man in the middle converts all https links to http and proxies out the traffic. A victim would need to notice the missing https in the the url to detect this.

HSTS and https-everywhere browser plugin partially solves the problem.

I think the only viable solution is for all http traffic to be encrypted and to consider non-encrypted traffic suspect.


Cool calculator.

One thing that is missing is the opportunity cost of the down payment.

Also, in fairness, the renter scenario should be a smart renter that invests their money. Typically, a renter will have lower monthly housing costs in the beginning and will have more money for investment.

Ideally, the net worth should be compared after 25 years or something.


The economics field is not very well developed. It's a social science where experiments can't be reproduced.

The intuitive answer to the title is that the PRICE of dollars goes down. But that may not be the case. It depends on where the money goes. Perhaps it all goes into securitites or btc thus increase the price of those assets.


xss is surprisingly hard to prevent because user input must be escaped differently depending on context (html, css, js, json).

User input also shows up in surprising locations such as dns records and whois info.

Luckily, an effective xss attack e.g. targetting the admin of a target website, often require a large amount of effort and social engineering.


This is especially true for reflected attacks, besides doing target spear phishing via email or messenger apps it won't be succesful.

For persistent attacks, its mostly just sit and wait for an attacker - they don't really control when/if a user visits the compromised page.


Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: